-
公开(公告)号:US20240073207A1
公开(公告)日:2024-02-29
申请号:US18256439
申请日:2021-11-25
IPC分类号: H04L9/40
CPC分类号: H04L63/0861 , H04L63/107
摘要: A computer implemented method for authenticating a user, the method including receiving an authentication request from a first computer system, the authentication request including an indication of an identity of the user to be authenticated; receiving one or more authentication factors for verifying the identity of the user, the one or more authentication factors including at least one authentication factor obtained from a second computer system associated with the user having the indicated identity; receiving an auxiliary authentication factor, the auxiliary authentication factor comprising data for verifying that the second computer system is currently in the possession of the user having the indicated identity; and verifying the identity of the user based on the one or more authentication factors and the auxiliary authentication factor.
-
公开(公告)号:US20230216744A1
公开(公告)日:2023-07-06
申请号:US18000860
申请日:2021-06-02
发明人: Jonathan ROSCOE , Gabriele GELARDI
IPC分类号: H04L41/14 , H04L41/5025 , H04L41/40
CPC分类号: H04L41/145 , H04L41/5025 , H04L41/40
摘要: A computer implemented method of adapting a configuration of a software defined network to improve a measure of network performance towards an objective measure of performance, the network including a plurality of network nodes communicating via the network, the method including each node applying an evolutionary algorithm to generate a candidate adjusted configuration for the network and, responsive to a determination that the candidate provides an improvement to the measure of network performance, the node storing the candidate in a distributed database accessible to the nodes for access by other nodes; each node accessing candidate adjusted configurations in the distributed database and determining a performance of the network provided by each accessed candidate, wherein each node records the determined performance provided by a candidate in the database in association with the candidate, such that a candidate adjusted configuration providing a greatest improvement to the measure of network performance is selected by the nodes for adapting the configuration of the network.
-
公开(公告)号:US20230189003A1
公开(公告)日:2023-06-15
申请号:US17926502
申请日:2021-05-14
发明人: Gabriele GELARDI , Gery DUCATEL , Zhan CUI
CPC分类号: H04W12/50 , H04L9/0827 , H04L9/0866
摘要: A method of pairing a user device with a remote system. The user device communicates with an intermediary device via a secure communication channel to cause a secret key generated by the remote system to be received by the user device, from the intermediary device. The secret key is thereby assigned to the user device. The user device establishes communication with the remote system to pair the user device with the remote system using the secret key, such that data sent from the user device to the remote system is encrypted using the secret key and data received by the user device from the remote system is decrypted using the secret key.
-
公开(公告)号:US20220376902A1
公开(公告)日:2022-11-24
申请号:US17753774
申请日:2020-09-11
发明人: Ali SAJJAD , Gery DUCATEL , Gabriele GELARDI
IPC分类号: H04L9/08
摘要: There is provided a computer implemented method for accessing a resource at a computing device, as well as for controlling access to a resource by a computing device. The computing device receives a policy indicating a set of conditions under which access to the resource is permitted, determines whether each of the conditions are initially present based on an output of one or more sensors of the device, and monitors the one or more sensors to detect a change in the presence of one or more of the conditions. In response to detecting the change in the presence of one or more of the conditions, the computing device determines whether each of the conditions are present. In response to determining that each of the conditions is present, access to the resource is enabled. If at least one of the conditions is not present, access to the resource is prevented.
-
公开(公告)号:US20220261466A1
公开(公告)日:2022-08-18
申请号:US17597629
申请日:2020-06-16
发明人: Gabriele GELARDI , Ali Sajjad , Gery DUCATEL
摘要: Computer implemented methods for enrolling a user as an authenticated user of a computing device and for authenticating a user of a computing device are provided. The methods make use of behavioral biometrics to determine a set of shares that represent a secret credential according to a secret sharing scheme. The set of shares is initially determined when the user is enrolled based on typical measurements of the user's behavioral biometrics and authentication data indicating how to generate the set of shares from a user's behavioral biometrics is generated. When authenticating the user, the computing device can generate the set of shares based on the authentication data and measurements of the current user's behavioral biometrics. The computing device can use the generated set of shares to recreate a copy of the secret credential with which to authenticate the user.
-
公开(公告)号:US20220164422A1
公开(公告)日:2022-05-26
申请号:US17310969
申请日:2020-02-28
发明人: Gabriele GELARDI , Gery DUCATEL
摘要: A computer implemented method of access control for a user device having at least one component for determining behaviours of the user, the method comprising: defining a training period during which access to the device is determined based on a credential-based authentication scheme wherein each access determination is used to generate an item of training data including at least a result of the credential-based authentication and a behaviour of the user; training a machine learning classifier based on the training data such that the classifier is operable to classify user behaviour as compliant or non-compliant such that compliant behaviour is determined by the classifier to be consistent with prior behaviour for permitting access to the device subsequent to the training period; and responsive to a determination that a behaviour subsequent to the training period is classified as non-compliant, requesting a credential-based authentication of the user and permitting access to the device in response to the credential-based authentication, wherein permitting access to the device further includes constructively training the classifier based on the subsequent behaviour as a compliant behaviour by providing the subsequent behaviour as an additional training example.
-
公开(公告)号:US20220156351A1
公开(公告)日:2022-05-19
申请号:US17310972
申请日:2020-02-28
发明人: Gabriele GELARDI , Gery DUCATEL
摘要: A computer implemented method of access control for a user device having at least one component for determining behaviors of the user. The method including accessing a machine learning classifier trained based on at least one prior behavior of the user using the device, the classifier classifying user behavior as compliant or non-compliant such that compliant behavior is determined by the classifier to be consistent with prior behavior for permitting access to the device. The method further includes, in response to a determination that a subsequent behavior is classified as non-compliant, requesting a credential-based authentication of the user and permitting access to the device in response to the credential-based authentication, wherein permitting access to the device further includes constructively training the classifier based on the subsequent behavior as a compliant behavior by providing the subsequent behavior as an additional training example.
-
公开(公告)号:US20220100829A1
公开(公告)日:2022-03-31
申请号:US17310968
申请日:2020-02-28
发明人: Gabriele GELARDI , Gery DUCATEL
摘要: A computer implemented method of access control for a user device having at least one component for determining behaviors of the user. The method including accessing a first machine learning classifier trained based on at least one prior behavior of the user using the device, the classifier classifying user behavior as compliant or non-compliant. The method further including, in response to a determination that a subsequent behavior is classified as non-compliant, accessing a second machine learning classifier trained based on at least one prior behavior of the user using the device where the prior behavior is classified as non-compliant by the first classifier. The method further including, in response to a determination that the subsequent behavior is classified as non-compliant by the second classifier, requesting a credential-based authentication of the user and constructively training one of the machine learning classifiers based on the credential-based authentication result
-
-
-
-
-
-
-